A review of the nist lightweight cryptography finalists and their fault analyses

H Madushan, I Salam, J Alawatugoda - Electronics, 2022 - mdpi.com
The security of resource-constrained devices is critical in the IoT field, given that everything
is interconnected. Therefore, the National Institute of Standards and Technology (NIST) …

Plundervolt: Software-based fault injection attacks against Intel SGX

K Murdock, D Oswald, FD Garcia… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Dynamic frequency and voltage scaling features have been introduced to manage ever-
growing heat and power consumption in modern processors. Design restrictions ensure …

{CLKSCREW}: Exposing the perils of {Security-Oblivious} energy management

A Tang, S Sethumadhavan, S Stolfo - 26th USENIX Security Symposium …, 2017 - usenix.org
The need for power-and energy-efficient computing has resulted in aggressive cooperative
hardware-software energy management mechanisms on modern commodity devices. Most …

SIFA: exploiting ineffective fault inductions on symmetric cryptography

C Dobraunig, M Eichlseder, T Korak… - IACR Transactions on …, 2018 - tches.iacr.org
Since the seminal work of Boneh et al., the threat of fault attacks has been widely known and
techniques for fault attacks and countermeasures have been studied extensively. The vast …

[Retracted] A Comprehensive Review of Lightweight Authenticated Encryption for IoT Devices

Z AlJabri, J Abawajy, S Huda - Wireless Communications and …, 2023 - Wiley Online Library
Internet of Things (IoT) is a promising technology for creating smart environments, smart
systems, and smart services. Since security is a fundamental requirement of IoT platforms …

Statistical ineffective fault attacks on masked AES with fault countermeasures

C Dobraunig, M Eichlseder, H Groß, S Mangard… - Advances in Cryptology …, 2018 - Springer
Implementation attacks like side-channel and fault attacks are a threat to deployed devices
especially if an attacker has physical access. As a consequence, devices like smart cards …

Fault attacks on CCA-secure lattice KEMs

P Pessl, L Prokop - IACR Transactions on Cryptographic Hardware …, 2021 - incs.ub.rub.de
NIST's post-quantum standardization effort very recently entered its final round. This makes
studying the implementation-security aspect of the remaining candidates an increasingly …

Hardware constructions for error detection in lightweight Welch-Gong (WG)-oriented streamcipher WAGE benchmarked on FPGA

J Kaur, A Sarker, MM Kermani… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Providing an acceptable level of security at low cost becomes a challenge in embedded
systems that have limited resources, eg, Internet of Things application devices. Lightweight …

Hardware constructions for lightweight cryptographic block cipher QARMA with error detection mechanisms

J Kaur, MM Kermani… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
The cryptographic algorithm QARMA is a family of lightweight tweakable block ciphers
targeted at applications such as memory encryption and construction of keyed hash …

A statistical fault analysis methodology for the ascon authenticated cipher

K Ramezanpour, P Ampadu… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
Authenticated ciphers are trending in secret key cryptography, since they combine
confidentiality, integrity, and authentication into one algorithm, and offer potential efficiencies …